monday, monday, I would know the lyrics to your song but the audio quality of you are garbage over my works PA system
Looks like a good weekend not to go out and do anything, thank goodness my internet is working again as I would have had to spend some long hours at the public Library in weather like this!!!
Well okay I am not that much of a wimp, I actually stood out in the cold for an hour last week by the roadside as part of the 10 person protest of the Canadian governments occupation of Haiti, wich made the pho and tea we had afterwards taste that much better!
Also actually managed to talk to Lavonne and Michelle at the last Wednesday meetup, which was the same day of the protest on top of which I had very little sleep as I had got up late to finish a book one of my comrades had lent me(which wasnt his, ti was the UofC libraries).
For those with marxist inclination it was writings of Bukarin against the left opposition and speciifc Preobryzinsky the main economist of the Left opposition in which I had recently finsished his work "from NEP to socialism" which I purchased from Mehring books.
All I can say is that at some points if you remove "peasant" from the paragraphs, you would think you are reading a modern day economist, the man truly beleived that monetary policy was the only correction needed and that its "circulation" is THE connection of state industry to peasant industry.
ummmm oh yes I was talking about the last wednesday get together, hehe well I think the lack of sleep I mainly just added whatever came to my mind that they were discussing, though with inflation in the city right now I am not sure if it equaled 2 cents, but Lavonne and Michelle kept me awake with their various stories and subjects.
No one familiar from the last time I attended a SG meetup in this city, but I guess times have changed and people move around in this society, hopefully by choice and not by the chain.
Take care all you proletariate out there;
here is a more detailed account of the attack on the MIA
Attack Log
--------------------------------------------------------------------------------
January 10 - 13: Sporadic reports come in from volunteers in Australia and Asia that the MIA is not accesible for a few hours, and then comes back.
First attack
January 15: MIA detects a series of DoS (Denial of Service) SYN floods from various Chinese networks. Unlike the attacks of the previous few days, these are constant. These attacks cause our server to have a kernel panic and crash. Just as soon as the server reboots, the SYN floods [CVE-1999-0116] cause another crash, and this continues constantly.
First, we write a crude script that blocks every SYN flood attempt, every minute. This is successful only for a short period, as the sheer number of Chinese IPs sending the SYN floods is too large to overcome. Next, we figure out that the SYN floods are exploiting a vulnerability in the Linux kernel (version 2.4.23), and we rebuild the Linux kernel to version 2.4.34, which overcomes these attacks. Meanwhile, the nature and origin of the attack, our previous history with the Chinese government (censorship, etc), and the experience of others suggest that this maybe politically motivated and directed by the Chinese government.
1 hour sample of attacking IP origins
222.35.30.105 China Railway Telecom, Beijing
60.16.220.61 CNC Group, Liaoning Province Network, Liaoning
121.34.136.245 China Net, Guangdong Province Network, Guanzhou
222.240.83.89 China Net, Changsha Node Network
122.4.213.41 China Net, Shandong Province Network, Jinan
203.192.13.2 Xinhua News Agency
221.216.207.194 CNC Group, Beijing Province Network, Beijing
221.6.37.60 Nanjing Medical University, Nanjing Jiangsu Province Network, Nanjing
221.226.2.213 China Net, Jiangsu Province Network, Jiangsu
61.233.167.159 China Railway Telecom Center, unknown city
At this point, however, our 4 year old server heaves under the strain. The string of constant reboots has taken its toll: the server reports a Machine Check Exception of a CPU context corruption, causing further crashes. This process further bludgeons the damaged server, and subsequent boots cause a failure in the RAID, forcing a rebuild of the array. During further crashes, one of the disks fails, causing future rebuilds of the array to be quite hopeless.
Ironically, MIA had planned to purchase a new server in 2007, since our server was 4 years old, and our life expectancy for the server had nearly arrived. This attack forced this process to double, but another disaster would soon strike.
January 16: In order to buy a new server, we needed to speak to our hosting provider and ISP, CCCP. We had been trying to contact CCCP for several months, to no avail, but after an urgent appeal, we finally recieved a response: CCCP is shutting down on February 1st. This, at least, explained our difficulties in contacting them!
To recount events to date: first, we are attacked by China; second, our server hardware fails; third, our hosting provider is shutting down in two weeks.
Late in the day, after reviewing several options, we resolve on the kind of server to buy to meet our needs.
January 17: After a long search consisting of about 12 different options for colocation, we find one that suits our high bandwidth needs at a reasonable, low cost.
January 18: After three days of debate, MIA votes 14 to 4 to include notice indicating that the source of the attacks was likely the Chinese government.
January 20: Marxists.org is redirected to our mirror servers. On the following day, a round robin DNS is setup between three MIA mirrors.
Second attack
January 21-24: Mirror sites find a change in tactics, now a more crude Denial of Service attack is launched: Chinese sources download in mass material from the Chinese section. The German mirror combats this by limiting the number of connections to the server. Nevertheless, server load remains extremely high.
Looks like a good weekend not to go out and do anything, thank goodness my internet is working again as I would have had to spend some long hours at the public Library in weather like this!!!
Well okay I am not that much of a wimp, I actually stood out in the cold for an hour last week by the roadside as part of the 10 person protest of the Canadian governments occupation of Haiti, wich made the pho and tea we had afterwards taste that much better!
Also actually managed to talk to Lavonne and Michelle at the last Wednesday meetup, which was the same day of the protest on top of which I had very little sleep as I had got up late to finish a book one of my comrades had lent me(which wasnt his, ti was the UofC libraries).
For those with marxist inclination it was writings of Bukarin against the left opposition and speciifc Preobryzinsky the main economist of the Left opposition in which I had recently finsished his work "from NEP to socialism" which I purchased from Mehring books.
All I can say is that at some points if you remove "peasant" from the paragraphs, you would think you are reading a modern day economist, the man truly beleived that monetary policy was the only correction needed and that its "circulation" is THE connection of state industry to peasant industry.
ummmm oh yes I was talking about the last wednesday get together, hehe well I think the lack of sleep I mainly just added whatever came to my mind that they were discussing, though with inflation in the city right now I am not sure if it equaled 2 cents, but Lavonne and Michelle kept me awake with their various stories and subjects.
No one familiar from the last time I attended a SG meetup in this city, but I guess times have changed and people move around in this society, hopefully by choice and not by the chain.
Take care all you proletariate out there;
here is a more detailed account of the attack on the MIA
Attack Log
--------------------------------------------------------------------------------
January 10 - 13: Sporadic reports come in from volunteers in Australia and Asia that the MIA is not accesible for a few hours, and then comes back.
First attack
January 15: MIA detects a series of DoS (Denial of Service) SYN floods from various Chinese networks. Unlike the attacks of the previous few days, these are constant. These attacks cause our server to have a kernel panic and crash. Just as soon as the server reboots, the SYN floods [CVE-1999-0116] cause another crash, and this continues constantly.
First, we write a crude script that blocks every SYN flood attempt, every minute. This is successful only for a short period, as the sheer number of Chinese IPs sending the SYN floods is too large to overcome. Next, we figure out that the SYN floods are exploiting a vulnerability in the Linux kernel (version 2.4.23), and we rebuild the Linux kernel to version 2.4.34, which overcomes these attacks. Meanwhile, the nature and origin of the attack, our previous history with the Chinese government (censorship, etc), and the experience of others suggest that this maybe politically motivated and directed by the Chinese government.
1 hour sample of attacking IP origins
222.35.30.105 China Railway Telecom, Beijing
60.16.220.61 CNC Group, Liaoning Province Network, Liaoning
121.34.136.245 China Net, Guangdong Province Network, Guanzhou
222.240.83.89 China Net, Changsha Node Network
122.4.213.41 China Net, Shandong Province Network, Jinan
203.192.13.2 Xinhua News Agency
221.216.207.194 CNC Group, Beijing Province Network, Beijing
221.6.37.60 Nanjing Medical University, Nanjing Jiangsu Province Network, Nanjing
221.226.2.213 China Net, Jiangsu Province Network, Jiangsu
61.233.167.159 China Railway Telecom Center, unknown city
At this point, however, our 4 year old server heaves under the strain. The string of constant reboots has taken its toll: the server reports a Machine Check Exception of a CPU context corruption, causing further crashes. This process further bludgeons the damaged server, and subsequent boots cause a failure in the RAID, forcing a rebuild of the array. During further crashes, one of the disks fails, causing future rebuilds of the array to be quite hopeless.
Ironically, MIA had planned to purchase a new server in 2007, since our server was 4 years old, and our life expectancy for the server had nearly arrived. This attack forced this process to double, but another disaster would soon strike.
January 16: In order to buy a new server, we needed to speak to our hosting provider and ISP, CCCP. We had been trying to contact CCCP for several months, to no avail, but after an urgent appeal, we finally recieved a response: CCCP is shutting down on February 1st. This, at least, explained our difficulties in contacting them!
To recount events to date: first, we are attacked by China; second, our server hardware fails; third, our hosting provider is shutting down in two weeks.
Late in the day, after reviewing several options, we resolve on the kind of server to buy to meet our needs.
January 17: After a long search consisting of about 12 different options for colocation, we find one that suits our high bandwidth needs at a reasonable, low cost.
January 18: After three days of debate, MIA votes 14 to 4 to include notice indicating that the source of the attacks was likely the Chinese government.
January 20: Marxists.org is redirected to our mirror servers. On the following day, a round robin DNS is setup between three MIA mirrors.
Second attack
January 21-24: Mirror sites find a change in tactics, now a more crude Denial of Service attack is launched: Chinese sources download in mass material from the Chinese section. The German mirror combats this by limiting the number of connections to the server. Nevertheless, server load remains extremely high.
redbstrd:
Well, I was actually just posting the lyrics because I heard that song by chance and it is awesome. However, life is good because I found out that the Russian girl in Kazan is single and my buddy got me her number today.
lavonne:
I think there were a few others, but it's interesting to see how many people immediately think she's crazy.